Cyber Security on Azure An IT Professional’s Guide to Microsoft Azure Security Center /

Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service�...

Full description

Main Author: Copeland, Marshall. (Author, http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2017.
Edition:1st ed. 2017.
Subjects:
Online Access:https://doi.org/10.1007/978-1-4842-2740-4
LEADER 03298nam a22004695i 4500
001 978-1-4842-2740-4
003 DE-He213
005 20210618225030.0
007 cr nn 008mamaa
008 170719s2017 xxu| s |||| 0|eng d
020 |a 9781484227404  |9 978-1-4842-2740-4 
024 7 |a 10.1007/978-1-4842-2740-4  |2 doi 
050 4 |a QA76.76.M52 
072 7 |a UMP  |2 bicssc 
072 7 |a COM051380  |2 bisacsh 
072 7 |a UMP  |2 thema 
082 0 4 |a 004.165  |2 23 
100 1 |a Copeland, Marshall.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Cyber Security on Azure  |h [electronic resource] :  |b An IT Professional’s Guide to Microsoft Azure Security Center /  |c by Marshall Copeland. 
250 |a 1st ed. 2017. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2017. 
300 |a XVIII, 208 p. 137 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Part I: All Business Roles.- Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business.- Chapter 2: Azure Security Center Cost Model.- Part II: Cloud Security Operations.- Chapter 3: Azure Security Center Getting Started.- Chapter 4: Azure Security Center Configuration.- Chapter 5: Azure Security Center Scenarios.- Chapter 6: Azure Security Center Extensions -- Appendix A. Troubleshooting & Cyber Reference -- Appendix B. Know Your Enemy -- Appendix C. Security Frameworks. 
520 |a Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies. This book provides step-by-step guidance on how to: Support enterprise security policies improve cloud security Configure intrusion d etection  Identify potential vulnerabilities Prevent enterprise security failures. 
650 0 |a Microsoft software. 
650 0 |a Microsoft .NET Framework. 
650 0 |a Computer security. 
650 1 4 |a Microsoft and .NET.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I29030 
650 2 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781484227398 
776 0 8 |i Printed edition:  |z 9781484227411 
856 4 0 |u https://doi.org/10.1007/978-1-4842-2740-4 
912 |a ZDB-2-CWD 
912 |a ZDB-2-SXPC 
950 |a Professional and Applied Computing (SpringerNature-12059) 
950 |a Professional and Applied Computing (R0) (SpringerNature-43716)